eapol/eapol_framework/eapol_common/type/mschapv2/include/eap_type_mschapv2_types.h
changeset 0 c8830336c852
child 2 1c7bc153c08e
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/eapol/eapol_framework/eapol_common/type/mschapv2/include/eap_type_mschapv2_types.h	Thu Dec 17 08:47:43 2009 +0200
@@ -0,0 +1,212 @@
+/*
+* Copyright (c) 2001-2006 Nokia Corporation and/or its subsidiary(-ies).
+* All rights reserved.
+* This component and the accompanying materials are made available
+* under the terms of the License "Eclipse Public License v1.0"
+* which accompanies this distribution, and is available
+* at the URL "http://www.eclipse.org/legal/epl-v10.html".
+*
+* Initial Contributors:
+* Nokia Corporation - initial contribution.
+*
+* Contributors:
+*
+* Description:  EAP and WLAN authentication protocols.
+*
+*/
+
+
+
+
+#ifndef _MSCHAPV2_TYPES_H_
+#define _MSCHAPV2_TYPES_H_
+
+#include "eap_configuration_field.h"
+
+const u32_t EAP_MSCHAPV2_USERNAME_MAX_SIZE = 512; // 256 unicode-chars
+const u32_t EAP_MSCHAPV2_PASSWORD_MAX_SIZE = 512; // 256 unicode-chars
+
+const u32_t EAP_MSCHAPV2_AUTHENTICATOR_RESPONSE_SIZE = 42;
+const u32_t EAP_MSCHAPV2_CHALLENGE_HASH_SIZE = 8;
+const u32_t EAP_MSCHAPV2_NT_RESPONSE_SIZE = 24;
+const u32_t EAP_MSCHAPV2_AUTHENTICATOR_CHALLENGE_SIZE = 16;
+const u32_t EAP_MSCHAPV2_PEER_CHALLENGE_SIZE = 16;
+const u32_t EAP_MSCHAPV2_IDENT_SIZE = 1;
+const u32_t EAP_MSCHAPV2_FLAGS_SIZE = 1;
+const u32_t EAP_MSCHAPV2_OPCODE_SIZE = 1;
+const u32_t EAP_MSCHAPV2_CHANGE_PASSWORD_FLAGS_SIZE = 2;
+const u32_t EAP_MSCHAPV2_RESERVED_RESPONSE_SIZE = 8;
+const u32_t EAP_MSCHAPV2_MD4_DIGEST_SIZE = 16;
+const u32_t EAP_MSCHAPV2_SHA1_DIGEST_SIZE = 20;
+const u32_t EAP_MSCHAPV2_DES_KEY_SIZE = 8;
+const u32_t EAP_MSCHAPV2_DES_BLOCK_SIZE = 8;
+
+const u32_t EAP_MSCHAPV2_RESPONSE_MESSAGE_SIZE
+	= EAP_MSCHAPV2_IDENT_SIZE
+	+ EAP_MSCHAPV2_FLAGS_SIZE
+	+ EAP_MSCHAPV2_PEER_CHALLENGE_SIZE
+	+ EAP_MSCHAPV2_RESERVED_RESPONSE_SIZE
+	+ EAP_MSCHAPV2_NT_RESPONSE_SIZE;
+
+const u32_t EAP_MSCHAPV2_PEER_CHALLENGE_OFFSET
+	= EAP_MSCHAPV2_IDENT_SIZE
+	+ EAP_MSCHAPV2_FLAGS_SIZE;
+
+const u32_t EAP_MSCHAPV2_NT_RESPONSE_OFFSET
+	= EAP_MSCHAPV2_PEER_CHALLENGE_OFFSET
+	+ EAP_MSCHAPV2_PEER_CHALLENGE_SIZE
+	+ EAP_MSCHAPV2_RESERVED_RESPONSE_SIZE;
+
+
+const u32_t EAP_MSCHAPV2_MASTER_KEY_SIZE = 16;
+
+const u32_t EAP_MSCHAPV2_SUCCESS_REQUEST_MESSAGE_MIN_LENGTH = 42;// "S=<40>"
+const u32_t EAP_MSCHAPV2_FAILURE_MIN_SIZE = 48;
+const u32_t EAP_MSCHAPV2_FAILURE_REQUEST_SIZE = 67; // "E=eeeeeeeeee R=r C=cccccccccccccccccccccccccccccccc V=vvvvvvvvvv M="
+const u32_t EAP_MSCHAPV2_CHANGE_PASSWORD_ENCRYPTED_PASSWORD_SIZE = 516;
+const u32_t EAP_MSCHAPV2_CHANGE_PASSWORD_ENCRYPTED_HASH_SIZE = 16;
+const u32_t EAP_MSCHAPV2_HEADER_SIZE = 4; // OpCode, MS-CHAPv2-ID and MS-Length
+
+
+const u8_t EAP_MSCHAPV2_MESSAGE_PREFIX[] = " M=";
+const u32_t EAP_MSCHAPV2_MESSAGE_PREFIX_SIZE = 3;
+
+const u8_t EAP_MSCHAPV2_IMPLICIT_CHALLENGE_HANDLE_KEY[] = "eap_type_mschapv2_c implicit challenge";
+
+const u8_t EAP_MSCHAPV2_ZERO_CHALLENGE[]
+	= { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
+		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, };
+
+typedef struct
+{
+	u8_t password[EAP_MSCHAPV2_PASSWORD_MAX_SIZE]; // 256 unicode-chars
+	u32_t password_length;
+} pw_block_s;
+
+enum eap_type_mschapv2_stored_e
+{
+	eap_type_mschapv2_stored_none,
+	eap_type_mschapv2_stored_username,
+	eap_type_mschapv2_stored_password,
+	eap_type_mschapv2_implicit_challenge,
+	eap_type_mschapv2_stored_password_expired_flag,
+};
+
+
+const u32_t TRACE_FLAGS_MSCHAPV2_ERROR = eap_am_tools_c::eap_trace_mask_error;
+
+/**
+ *  This is boolean configuration option.
+ *  True value of this flag causes client return random
+ *  identity on EAP-Response/Identity.
+ *  False value causes client return real identity
+ *  (IMSI, pseudonym or re-authentication identity)
+ *  in EAP-Response/Identity.
+ *  Default value is false.
+ */
+EAP_CONFIGURATION_FIELD(
+	cf_str_EAP_MSCHAPV2_wait_eap_success_packet,
+	"EAP_MSCHAPV2_wait_eap_success_packet",
+	eap_configure_type_boolean,
+	false);
+
+EAP_CONFIGURATION_FIELD(
+	cf_str_EAP_MSCHAPV2_password_prompt,
+	"EAP_MSCHAPV2_password_prompt",
+	eap_configure_type_boolean,
+	false);
+
+EAP_CONFIGURATION_FIELD(
+	cf_str_EAP_MSCHAPV2_username,
+	"EAP_MSCHAPV2_username",
+	eap_configure_type_hex_data,
+	false);
+
+EAP_CONFIGURATION_FIELD(
+	cf_str_EAP_MSCHAPV2_password,
+	"EAP_MSCHAPV2_password",
+	eap_configure_type_hex_data,
+	true);
+
+EAP_CONFIGURATION_FIELD(
+	cf_str_EAP_MSCHAPV2_use_implicit_challenge,
+	"EAP_MSCHAPV2_use_implicit_challenge",
+	eap_configure_type_boolean,
+	false);
+
+EAP_CONFIGURATION_FIELD(
+	cf_str_EAP_MSCHAPV2_use_EAP_FAST_challenge,
+	"EAP_MSCHAPV2_use_EAP_FAST_challenge",
+	eap_configure_type_boolean,
+	false);
+
+EAP_CONFIGURATION_FIELD(
+	cf_str_EAP_MSCHAPV2_client_EAP_FAST_challenge,
+	"EAP_MSCHAPV2_client_EAP_FAST_challenge",
+	eap_configure_type_hex_data,
+	false);
+
+EAP_CONFIGURATION_FIELD(
+	cf_str_EAP_MSCHAPV2_server_EAP_FAST_challenge,
+	"EAP_MSCHAPV2_server_EAP_FAST_challenge",
+	eap_configure_type_hex_data,
+	false);
+
+EAP_CONFIGURATION_FIELD(
+	cf_str_EAP_MSCHAPV2_use_EAP_FAST_full_key,
+	"EAP_MSCHAPV2_use_EAP_FAST_full_key",
+	eap_configure_type_boolean,
+	false);
+
+EAP_CONFIGURATION_FIELD(
+	cf_str_EAP_MSCHAPV2_use_eap_expanded_type,
+	"EAP_MSCHAPV2_use_eap_expanded_type",
+	eap_configure_type_boolean,
+	false);
+
+EAP_CONFIGURATION_FIELD(
+	cf_str_EAP_MSCHAPV2_do_password_expiration_tests,
+	"EAP_MSCHAPV2_do_password_expiration_tests",
+	eap_configure_type_boolean,
+	false);
+
+EAP_CONFIGURATION_FIELD(
+	cf_str_EAP_MSCHAPV2_do_wrong_password_tests,
+	"EAP_MSCHAPV2_do_wrong_password_tests",
+	eap_configure_type_boolean,
+	false);
+
+EAP_CONFIGURATION_FIELD(
+	cf_str_EAP_MSCHAPV2_do_asyncronous_completition,
+	"EAP_MSCHAPV2_do_asyncronous_completition",
+	eap_configure_type_boolean,
+	false);
+
+/**
+ *  This u32_t configuration value specifies the maximum session validity time in seconds.
+ *  Default value is 12 hours in seconds, which is 43200 seconds.
+ */
+EAP_CONFIGURATION_FIELD(
+	cf_str_EAP_MSCHAPv2_max_session_validity_time,
+	"EAP_MSCHAPv2_max_session_validity_time",
+	eap_configure_type_u32_t,
+	false);
+
+/** @} */ // End of group MSCHAPV2_config_options.
+
+//--------------------------------------------------
+
+/// Macro traces payload type and data.
+#define EAP_MSCHAPV2_TRACE_PAYLOAD(prefix, payload) \
+	{ \
+		EAP_TRACE_DEBUG(m_am_tools, TRACE_FLAGS_DEFAULT|TRACE_TEST_VECTORS, (EAPL("%s (0x%08x): current payload 0x%04x=%s, data length 0x%04x.\n"), \
+			prefix, payload, payload->get_current_payload(), payload->get_payload_AT_string(), payload->get_data_length())); \
+		EAP_TRACE_DATA_DEBUG(m_am_tools, TRACE_FLAGS_DEFAULT|TRACE_TEST_VECTORS, (EAPL("payload"), \
+			payload, \
+			payload->get_payload_length())); \
+	}
+
+//--------------------------------------------------
+
+
+#endif //#if !defined(_MSCHAPV2_TYPES_H_)